About the security content of Mac OS X v10.6.7 and Security Update 2011-001

This document describes the security content of Mac OS X v10.6.7 and Security Update 2011-001, which can be downloaded and installed via Software Update preferences, or from Apple Downloads.

For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.

Mac OS X v10.6.7 and Security Update 2011-001

Impact: When connected to Wi-Fi, an attacker on the same network may be able to cause a system reset

&NewLine;

Description: A divide by zero issue existed in the handling of Wi-Fi frames. When connected to Wi-Fi, an attacker on the same network may be able to cause a system reset. This issue does not affect systems prior to Mac OS X v10.6.

Description: Apache is updated to version 2.2.17 to address several vulnerabilities, the most serious of which may lead to a denial of service. Further information is available via the Apache web site at http://httpd.apache.org/

Impact: Running an AppleScript Studio-based application that allows untrusted input to be passed to a dialog may lead to an unexpected application termination or arbitrary code execution

&NewLine;

Description: A format string issue existed in AppleScript Studio's generic dialog commands &lpar;"display dialog" and "display alert"&rpar;. Running an AppleScript Studio-based application that allows untrusted input to be passed to a dialog may lead to an unexpected application termination or arbitrary code execution.

Impact: Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution

&NewLine;

Description: A heap buffer overflow issue existed in the handling of OpenType fonts. Viewing or downloading a document containing a maliciously crafted embedded font may lead to arbitrary code execution.

Impact: Using the command line bzip2 or bunzip2 tool to decompress a bzip2 file may result in an unexpected application termination or arbitrary code execution

&NewLine;

Description: An integer overflow issue existed in bzip2's handling of bzip2 compressed files. Using the command line bzip2 or bunzip2 tool to decompress a bzip2 file may result in an unexpected application termination or arbitrary code execution.

Impact: Applications that use FSFindFolder&lpar;&rpar; with the kTemporaryFolderType flag may be vulnerable to a local information disclosure

&NewLine;

Description: When used with the kTemporaryFolderType flag, the FSFindFolder&lpar;&rpar; API returns a directory that is world readable. This issue is addressed by returning a directory that is only readable by the user that the process is running as.

&NewLine;

CVE-ID

&NewLine;

CVE-2011-0178

&NewLine;

&NewLine;

&NewLine;

&NewLine;

ClamAV

&NewLine;

Available for: Mac OS X Server v10.5.8, Mac OS X Server v10.6.6

&NewLine;

Impact: Multiple vulnerabilities in ClamAV

&NewLine;

Description: Multiple vulnerabilities exist in ClamAV, the most serious of which may lead to arbitrary code execution. This update addresses the issues by updating ClamAV to version 0.96.5. ClamAV is distributed only with Mac OS X Server systems. Further information is available via the ClamAV website at http://www.clamav.net/

Impact: Visiting a maliciously crafted website may lead to the installation of an agent that contacts an arbitrary server when the user logs in, and mislead the user into thinking that the connection is with Apple

&NewLine;

Description: A URL processing issue in Install Helper may lead to the installation of an agent that contacts an arbitrary server when the user logs in. The dialog resulting from a connection failure may lead the user to believe that the connection was attempted with Apple. This issue is addressed by removing Install Helper.

Description: Multiple cryptographic issues existed in MIT Kerberos 5. Only CVE-2010-1323 affects Mac OS X v10.5. Further information on the issues and the patches applied is available via the MIT Kerberos website at http://web.mit.edu/Kerberos/

Impact: A local user may be able to execute arbitrary code with system privileges

&NewLine;

Description: A privilege checking issue existed in the i386&lowbar;set&lowbar;ldt system call's handling of call gates. A local user may be able to execute arbitrary code with system privileges. This issue is addressed by disallowing creation of call gate entries via i386&lowbar;set&lowbar;ldt&lpar;&rpar;.

Impact: A remote attacker may be able to cause a denial of service on hosts that export NFS file systems

&NewLine;

Description: An integer truncation issue existed in Libinfo's handling of NFS RPC packets. A remote attacker may be able to cause NFS RPC services such as lockd, statd, mountd, and portmap to become unresponsive.

Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution

&NewLine;

Description: A double free issue existed in libxml's handling of XPath expressions. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue does not affect systems prior to Mac OS X v10.6.

&NewLine;

CVE-ID

&NewLine;

CVE-2010-4494 : Yang Dingning of NCNIPC, Graduate University of Chinese Academy of Sciences

Description: PHP is updated to version 5.3.4 to address multiple vulnerabilities, the most serious of which may lead to arbitrary code execution. Further information is available via the PHP website at http://www.php.net/

&NewLine;

CVE-ID

&NewLine;

CVE-2006-7243

&NewLine;

CVE-2010-2950

&NewLine;

CVE-2010-3709

&NewLine;

CVE-2010-3710

&NewLine;

CVE-2010-3870

&NewLine;

CVE-2010-4150

&NewLine;

CVE-2010-4409

&NewLine;

&NewLine;

&NewLine;

&NewLine;

PHP

&NewLine;

Available for: Mac OS X v10.5.8, Mac OS X Server v10.5.8

&NewLine;

Impact: Multiple vulnerabilities in PHP 5.2.14

&NewLine;

Description: PHP is updated to version 5.2.15 to address multiple vulnerabilities, the most serious of which may lead to arbitrary code execution. Further information is available via the PHP website at http://www.php.net/

Impact: Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution

&NewLine;

Description: An integer overflow existed in QuickTime's handling of movie files. Viewing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution. For Mac OS X v10.5 this issue was addressed in QuickTime 7.6.9.

Impact: Visiting a maliciously crafted website may lead to the disclosure of video data from another site

&NewLine;

Description: A cross-origin issue existed in QuickTime plug-in's handling of cross-site redirects. Visiting a maliciously crafted website may lead to the disclosure of video data from another site. This issue is addressed by preventing QuickTime from following cross-site redirects.

Impact: Subversion servers that use the non-default "SVNPathAuthz short&lowbar;circuit" mod&lowbar;dav&lowbar;svn configuration setting may allow unauthorized users to access portions of the repository

&NewLine;

Description: Subversion servers that use the non-default "SVNPathAuthz short&lowbar;circuit" mod&lowbar;dav&lowbar;svn configuration setting may allow unauthorized users to access portions of the repository. This issue is addressed by updating Subversion to version 1.6.13. This issue does not affect systems prior to Mac OS X v10.6.

Impact: When ssh is used in Terminal's "New Remote Connection" dialog, SSH version 1 is selected as the default protocol version

&NewLine;

Description: When ssh is used in Terminal's "New Remote Connection" dialog, SSH version 1 is selected as the default protocol version. This issue is addressed by changing the default protocol version to "Automatic". This issue does not affect systems prior to Mac OS X v10.6.

Description: Multiple vulnerabilities existed in FreeType, the most serious of which may lead to arbitrary code execution when processing a maliciously crafted font. These issues are addressed by updating FreeType to version 2.4.4. Further information is available via the FreeType site at http://www.freetype.org/

&NewLine;

CVE-ID

&NewLine;

CVE-2010-3814

&NewLine;

CVE-2010-3855

&NewLine;

&NewLine;

Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance, or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Risks are inherent in the use of the Internet. Contact the vendor for additional information. Other company and product names may be trademarks of their respective owners.